Abstract
In the information age, the development and application of big data technology has provided great conveniences to people’s production and life, but at the same time, it has also deteriorated the safe operating environment of computer networks, and has brought greater threats to user privacy, property and data security. The research on computer network security under big data combines the current data encryption, analysis of reasons affecting computer security, and the effective use of data encryption for computer security as the main basis. From the introduction of data encryption technology, data encryption in computer security analysis and research on effective value, destruction of data by illegal means, destruction of data by virus intrusion, determination of data encryption direction, the research on encryption technology and the application of digital encryption technology, its purpose is to strengthen the operation of data encryption technology, in order to improve the computer security, providing reference materials for related research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, Q., Lu, P.: Research on application of artificial intelligence in computer network technology. Int. J. Pattern Recognit Artif Intell. 33(5), 1959015 (2019)
Shang, Y.: Discussion on data encryption technology in computer network information security. Software (12), 198–201 (2018). (in Chinese)
Liu, J.: Discussion on the application of data encryption technology in network information security. Inf. Comput. Theor. Edn. (21), 175–177 (2017). (in Chinese)
Abdel-Basset, M., Elhoseny, M., Gamal, A., Smarandache, F.: A novel model for evaluation hospital medical care systems based on plithogenic sets. Artif. Intell. Med., 31 August 2019, in Press. https://doi.org/10.1016/j.artmed.2019.101710
Wu, S.: Application research of data encryption technology in computer network security. Comput. Knowl. Technol. (36), 8633–8634 (2014). (in Chinese)
Zhou, G., Yu, G.: Discussion on the application of information encryption technology in computer network security. Comput. Disc Softw. Appl. (18), 36–38 (2012). (in Chinese)
Tang, Y., Elhoseny, M.: Computer network security evaluation simulation model based on neural network. J. Intell. Fuzzy Syst. (2019). https://doi.org/10.3233/jifs-179121
Hurrah, N.N., Parah, S.A., Loan, N.A., Sheikh, J.A., Elhoseny, M., Muhammad, K.: Dual watermarking framework for privacy protection and content authentication of multimedia. Future Gener. Comput. Syst. 94, 654–67 (2019). https://doi.org/10.1016/j.future.2018.12.036
Song, X.: Application of data encryption technology in computer network security. Digit. Technol. Appl. (04), 54–56 (2015). (in Chinese)
He, S.: Research on application of data encryption technology in computer network security. China New Commun. (24), 25–27 (2016). (in Chinese)
Zhu, Y.: Application research of data encryption technology in computer network security. Guizhou Electr. Power Technol. (11), 74–77 (2017). (in Chinese)
Haiguo, C.: Application analysis of data encryption technology in computer network communication security. Mod. Inf. Technol. (6), 102–104 (2017). (in Chinese)
Xu, F.: The role of data encryption technology in computer network communication security. Comput. Knowl. Technol. (26), 30–31 (2017). (in Chinese)
Jian, Z., Lantian, L.: Data encryption technology and application in computer network communication security. Network Secur. Technol. Appl. (8), 57–59 (2017). (in Chinese)
Yang, W.: Application of data encryption technology in computer network communication security. Network Secur. Technol. Appl. (4), 55–56 (2017). (in Chinese)
Yan, X.: Analyzing the application of data encryption technology in computer network communication security. Inf. Commun. (04), 188–189 (2018). (in Chinese)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Jiang, L. (2021). The Application Analysis of Computer Network Security Data Encryption Technology. In: Abawajy, J., Choo, KK., Xu, Z., Atiquzzaman, M. (eds) 2020 International Conference on Applications and Techniques in Cyber Intelligence. ATCI 2020. Advances in Intelligent Systems and Computing, vol 1244. Springer, Cham. https://doi.org/10.1007/978-3-030-53980-1_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-53980-1_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-53979-5
Online ISBN: 978-3-030-53980-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)